logo

CVE-2025-54124 org.xwiki.platform:xwiki-platform-legacy-oldcore

Package

Manager: maven
Name: org.xwiki.platform:xwiki-platform-legacy-oldcore
Vulnerable Version: >=9.8-rc-1 <16.4.7 || >=16.5.0-rc-1 <16.10.5 || >=17.0.0-rc-1 <17.2.0-rc-1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00026 pctl0.05723

Details

XWiki leaks password hashes and other accessible password properties ### Impact Any user with edit right on a page of the wiki can create an XClass with a database list property that references a password property, for example the password hash that is stored for users. When adding an object of that XClass, the content of that password property is displayed. In practice, with a standard rights setup, this means that any user with an account on the wiki can access password hashes of all users, and possibly other password properties (with hashed or plain storage) that are on pages that the user can view. ### Patches This vulnerability has been pached in XWiki 16.4.7, 16.10.5, and 17.2.0 by disallowing the use of password properties in database list properties. Additionally, queries for email properties are disallowed, too, when email obfuscation is enabled. ### Workarounds We're not aware of any workarounds.

Metadata

Created: 2025-08-05T17:12:03Z
Modified: 2025-08-06T14:31:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-r38m-cgpg-qj69/GHSA-r38m-cgpg-qj69.json
CWE IDs: ["CWE-359"]
Alternative ID: GHSA-r38m-cgpg-qj69
Finding: F038
Auto approve: 1